141
edits
Entrance Announcement
MICTE 2080
2080 Magh 07
Line 5: | Line 5: | ||
Class: VIII | Class: VIII | ||
== '''Specific objectives''' == | === '''Specific objectives''' === | ||
To learn the concept of cyber crime, its impact and basic cybersecurity practice. | To learn the concept of cyber crime, its impact and basic cybersecurity practice. | ||
== '''Teaching aids''' == | === '''Teaching aids''' === | ||
White board and Markers | White board and Markers | ||
Computer and Internet. | Computer and Internet. | ||
== '''Introduction (3 minutes)''' == | === '''Introduction (3 minutes)''' === | ||
Define cybercrime and its forms. | Define cybercrime and its forms. | ||
Discuss the importance of cybersecurity. | Discuss the importance of cybersecurity. | ||
== '''Types of cyber crime(3 minutes)''' == | === '''Types of cyber crime(3 minutes)''' === | ||
Explain Phishing malware and hacking. | Explain Phishing malware and hacking. | ||
== '''Cybersecurity Basics''' == | === '''Cybersecurity Basics (3 Minutes)''' === | ||
Emphasize the importance of strong password and multi factor authentication | |||
Advocate for regular software updates | |||
Educate about safe browsing and recognize the potential risk. | |||
=== '''Case study (2 minutes)''' === | |||
Examine Real life cyber crime cases and foster discussion on how these incidents could have been avoided with proper cybersecurity measures. | |||
=== '''Cybersecurity tools (2 Minutes)''' === | |||
Explore Antivirus software firewall | |||
Encourage students to understand the purpose and functionality of these tools in protecting digital assets. | |||
=== '''Group activity(5 Minutes)''' === | |||
Assign Scenarios related to cybersecurity issues for analysis | |||
Encourage collaborative problem solving and propose preventive measure | |||
=== '''Discussion and Q&A(5 Minutes)''' === | |||
Conduct a comprehensive class discussion on group activities | |||
Address any questions or concerns regarding cybercrime or cybersecurity. | |||
=== '''Assignments''' === | |||
Assign a research task on emerging cybersecurity threats or innovative technologies in the field. |
edits